Results 51 to 60 of about 1,926,564 (269)
An Improved Key Agreement Protocol Based on Fractal Theory [PDF]
A key agreement protocol is a key establishment technique which enables two or more communicating parities to agree on a key or exchange information over an open communication channel.
Nadia M. G. Al-Saidi
doaj +1 more source
Staging quantum cryptography with chocolate balls
Moderated by a director, laymen and students are encouraged to assume the role of quanta and enact a quantum cryptographic protocol. The performance is based on a generalized urn model capable of reproducing complementarity even for classical chocolate ...
Svozil, Karl
core +1 more source
Magnetic Unclonable Functions Leveraging Remanence and Anhysteretic States
A micrometric array of magnetic pillars provides a stable and unclonable hardware for generating cryptographic keys. From a single device, the ability is demonstrated to produce a 470‐bit key while also offering a reconfigurable mode of operation.
Alessandro Magni +6 more
wiley +1 more source
Oblivious Transfer based on Key Exchange
Key-exchange protocols have been overlooked as a possible means for implementing oblivious transfer (OT). In this paper we present a protocol for mutual exchange of secrets, 1-out-of-2 OT and coin flipping similar to Diffie-Hellman protocol using the ...
Abhishek Parakh +3 more
core +1 more source
Recent advances in diagnostics have accelerated the development of miniaturized wearable technologies for the continuous monitoring of diseases. This paradigm is shifting healthcare away from invasive, centralized blood tests toward decentralized monitoring, using alternative body biofluids.
Lanka Tata Rao +2 more
wiley +1 more source
Physical Unclonable Function (PUF)-Based e-Cash Transaction Protocol (PUF-Cash)
Electronic money (e-money or e-Cash) is the digital representation of physical banknotes augmented by added use cases of online and remote payments. This paper presents a novel, anonymous e-money transaction protocol, built based on physical unclonable ...
Jeff Calhoun +5 more
doaj +1 more source
This work introduces a novel approach for encoding and storing information in the liquid state in microdroplet arrays. These liquid‐in‐liquid prints are generated by a droplet printing system capable of dynamically setting the composition of each droplet pixel.
Maximilian Breitfeld +5 more
wiley +1 more source
On the Design of Cryptographic Primitives
The main objective of this work is twofold. On the one hand, it gives a brief overview of the area of two-party cryptographic protocols. On the other hand, it proposes new schemes and guidelines for improving the practice of robust protocol design.
Amparo Fúster-Sabater +10 more
core +1 more source
A new non-commutative key exchange protocol on combinatorial semigroup
Since the launch of the post-quantum cryptography standardization project by NIST, post-quantum cryptography has become a prominent research area. Non-commutative cryptography constructed using NP-complete problems is widely regarded resistant to quantum
Jing Zhang, Ya-Juan Yang, JingJing Bao
doaj +1 more source
LoET-E: A Refined Theory for Proving Security Properties of Cryptographic Protocols
Nowadays, more and more new cryptographic protocols are emerging, and the security analysis of emerging cryptographic protocols is increasingly important.
Jiawen Song +4 more
doaj +1 more source

